Mostrando 4 resultados de: 4
Filtros aplicados
Publisher
2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, CHILECON 2017 - Proceedings(1)
2019 IEEE Colombian Conference on Communications and Computing, COLCOM 2019 - Proceedings(1)
5th IEEE International Smart Cities Conference, ISC2 2019(1)
Journal of Advanced Research in Dynamical and Control Systems(1)
Área de conocimiento
Ciencias de la computación(2)
Computación en la nube(1)
Comunicación(1)
Planificación urbana(1)
Tecnologías de la información y la comunicación(1)
Origen
scopus(4)
Estimation of people flow in public transportation network through the origin-destination problem for the South-Eastern corridor of Quito city in the smart cities context
Conference ObjectAbstract: The present work proposes a model for estimation of users demand in the public transportation networPalabras claves:Bayesian inference, counting of passengers, origin destination matrix, Smart cities, Smart mobilityAutores:Antunez E.A., Larios-Rosillo V.M., Lina Patricia Zapata Molina, Maciel R., Marco Javier Flores-CaleroFuentes:googlescopusImplementation of fog computing for data pre-processing in an IoT and cloud computing scenario
Conference ObjectAbstract: Currently, Internet of Things (IoT) is a technological paradigm that is based on the collection of ePalabras claves:CLOUD COMPUTING, fog computing, internet of things (IoT), wireless sensor networks (WSN)Autores:Gabriel A. León-Paredes, Jack Fernando Bravo-Torres, Larios-Rosillo V.M., Pablo L. Gallegos-Segovia, Paúl A. Montesdeoca-Méndez, Paúl Esteban Vintimilla TapiaFuentes:googlescopusUnified communications as a service in hybrid networks
ArticleAbstract: Companies and organizations require structures that integrate voice, video, and data communicationsPalabras claves:Autores:Gabriel A. León-Paredes, Jack Fernando Bravo-Torres, Juan Paúl Inga Ortega, Larios-Rosillo V.M., Marco A. López-Reinoso, Pablo L. Gallegos-SegoviaFuentes:googlescopusSocial engineering as an attack vector for ransomware
Conference ObjectAbstract: Constant ransomware attacks achieve to evade multiple security perimeters, because its strategy is bPalabras claves:Attack vector, Ransomware anatomy, Ransomware mitigation, security of the information, social engineeringAutores:Iván F. Yuquilima-Albarado, Jack Fernando Bravo-Torres, Juan Paúl Inga Ortega, Larios-Rosillo V.M., Pablo L. Gallegos-Segovia, Paúl Esteban Vintimilla TapiaFuentes:googlescopus